Subject : Re: LUG: RoadRunner residential subnet mask IP filtering
From : Richard Carter <rwcarter@ncsu.[redacted]>
Date : Wed, 23 Dec 2009 01:16:29 -0500
> I presume you are filtering IP addresses to reduce the possibility ofYes, correct.
> someone SSHing or brute forcing into your computer, correct?
I thought about using something similar called Fail2ban:
> If this is the case, take a look at DenyHosts
< http://www.fail2ban.org/wiki/index.php/Main_Page >
I think either solution would be fine, however, there is another reason.
> If there is some other reason you're doing this, please share with me
> because I'd really like to know if I'm doing something wrong!
My auth log file had thousands of failed ssh attempts (before
implementing bruteforce protection). Using preset IP filtering will get
rid of virtually all these failed ssh attempts in the log file, whereas
the DenyHosts/Fail2ban methods will only reduce the number of failed ssh
attempts in the log file. This makes log monitoring much easier,
because the log file is far less cluttered.
--
Daniel Underwood
North Carolina State University
Graduate Student - Operations Research
email: daniel.underwood@ncsu.[redacted]
phone: XXX.302.3291
web: http://www4.ncsu.edu/~djunderw/
Replies :